Sept. 30, 2022, 1:20 a.m. | Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya

cs.CR updates on arXiv.org arxiv.org

In this paper, we propose an access control method with a secret key for
object detection models for the first time so that unauthorized users without a
secret key cannot benefit from the performance of trained models. The method
enables us not only to provide a high detection performance to authorized users
but to also degrade the performance for unauthorized users. The use of
transformed images was proposed for the access control of image classification
models, but these images cannot …

access access control control detection encrypted object

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, Ireland

Specialist, Database Security

@ OP Financial Group | Helsinki, FI

Senior Manager, Cyber Offensive Security

@ Edwards Lifesciences | Poland-Remote

Information System Security Officer

@ Booz Allen Hamilton | USA, AL, Huntsville (4200 Rideout Rd SW)

Senior Security Analyst - Protective Security (Open to remote across ANZ)

@ Canva | Sydney, Australia